Routing and Switching Essentials 6.0 Chapter 10Name Click here to enter text.

Device Discovery, Management, and Maintenance

10.1.1.1

What is Cisco Discovery Protocol?Click here to enter text.

10.1.1.2

For Cisco devices, CDP is enabled by Click here to enter text.

Do the Syntax Checker.

10.1.1.3

What command can be used to determine the network layout? Click here to enter text.

What command will show more details about the network layout? Click here to enter text.

10.1.2.1

What is the difference between CDP and Link Layer Discovery Protocol? Click here to enter text.

10.1.2.2

What command enables LLDP? Click here to enter text.

What command verifies LLDP? Click here to enter text.

Do the Syntax Checker.

10.1.2.3

What commands can be used to show LLDP enabled devices? Click here to enter text.

10.2.1.1

What is the purpose of Network Time Protcol? Click here to enter text.

10.2.1.2

What is Stratum level? Click here to enter text.

Describe Stratum 0. Click here to enter text.

Click here to enter text.stratum numbers indicate that the server is closer to the Click here to enter text.

The maximum hop count is 15. What does stratum 16 indicate? Click here to enter text.

10.2.1.3

Do the Syntax Checker.

10.2.2.1

What is syslog used for? Click here to enter text.

The syslog logging service provides three primary functions:

  • The ability to gather logging information for Click here to enter text.andClick here to enter text.
  • The ability to select the Click here to enter text. of logging information that is captured
  • The ability to specify the Click here to enter text. of captured syslog messages

10.2.2.2

What is the advantage of sending syslog messages to an external syslog server? Click here to enter text.

Messages sent to the Click here to enter text.are only viewable through the CLI of the device.

10.2.2.3

Every syslog message contains a Click here to enter text.level and a Click here to enter text..

The smaller numerical levels of syslog message are the more Click here to enter text.syslog alarms.

Study figures 1 and 2.

10.2.2.4

What command is used to force logged events to be time stamped? Click here to enter text.

10.2.3.1

What does the syslog server provide for the user? Click here to enter text.

What are two advantages of viewing syslog messages on a syslog server? Click here to enter text.

10.2.3.2

What is the difference between logging console and logging buffered? Click here to enter text.

10.2.3.3

What are the 3 steps to configure the routers to send system messages to a syslog server?Click here to enter text.

10.2.3.4

What is the show logging command used for? Click here to enter text.

10.3.1.1

What does the asterisk and # symbols indicate about a flash file? Click here to enter text.

Why does the dircommand list the contents of flash? Click here to enter text.

What commands do you have to enter to view the contents of NVRAM? Click here to enter text.

10.3.1.2

What command will show the file system on a Catalyst switch? Click here to enter text.

10.3.1.3

What utility can be used to backup and restore Text Files? Click here to enter text.

10.3.1.4

Copies of configuration files can be stored by using a Click here to enter text.orClick here to enter text.

10.3.1.5

The Click here to enter text.feature provides an optional secondary storage capability and an additional boot device.

10.3.1.6

What command would be used to copy the running configuration to a USB flash drive? Click here to enter text.

10.3.1.7

What are the steps for password recovery?

Step 1: Click here to enter text.

Step 2: Click here to enter text.

Step 3: Click here to enter text.

Step 4: Click here to enter text.

Console access to the device through a Click here to enter text.orClick here to enter text.software on a PC is required for password recovery.

Do the Syntax Checker.

10.3.2.1

Study the figure

10.3.2.2

Study figure 2.

10.3.3.1

Cisco IOS Software images and configuration files can be stored on a central Click here to enter text..

10.3.3.2

Do the Syntax Checker.

10.3.3.3

Follow these steps to upgrade the software on the Cisco router:

Step 1.Select a Click here to enter text.file that meets the requirements in terms of platform, features, and software. Download the file from cisco.com and transfer it to the TFTP server.

Step 2.Verify Click here to enter text.to the TFTP server.

Step 3.Ensure that there is sufficient flash Click here to enter text.on the router that is being upgraded.

Step 4.Copy the IOS image file from the TFTP server to the router using theClick here to enter text.command shown.

10.3.3.4

What is the boot system command used for? Click here to enter text.

10.3.4.1

Technology packages are enabled in the universal image via Cisco Software Activation Click here to enter text..

10.3.4.2

Study the figure.